Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2023, 07:00
Static task
static1
Behavioral task
behavioral1
Sample
983d67d04388730ba628b27784a602d7e62f0e4089dee0332606bc9273063cfc.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
983d67d04388730ba628b27784a602d7e62f0e4089dee0332606bc9273063cfc.exe
Resource
win10-20231025-en
Behavioral task
behavioral3
Sample
983d67d04388730ba628b27784a602d7e62f0e4089dee0332606bc9273063cfc.exe
Resource
win10v2004-20231020-en
General
-
Target
983d67d04388730ba628b27784a602d7e62f0e4089dee0332606bc9273063cfc.exe
-
Size
3.1MB
-
MD5
79478b5b07ac98ab3e74e1cf14d2cc83
-
SHA1
f3d6a96125e47e7b671139047828c5987e144d2d
-
SHA256
983d67d04388730ba628b27784a602d7e62f0e4089dee0332606bc9273063cfc
-
SHA512
8cb740017d3b725e51340b7517980f8eeee8ebdb0d3abe3f61b2083d36fbdf8b53959f2df8793f09598e51348cf4a67daecfcbe700ffb662969adce5e5f5a9c7
-
SSDEEP
49152:QSG332u2RwEAvtt/JTof30WCT7sQ+rGQ:xG332uhEA985GQ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = ffffffff hh.exe Key created \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags hh.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff hh.exe Key created \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 hh.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 hh.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff hh.exe Key created \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell hh.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff hh.exe Key created \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 hh.exe Key created \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings hh.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 7800310000000000545754881100557365727300640009000400efbe874f77487a571d382e000000c70500000000010000000000000000003a0000000000df8ed20055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 hh.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff hh.exe Key created \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 hh.exe Key created \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU hh.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 hh.exe Key created \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 hh.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff hh.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\NodeSlot = "1" hh.exe Key created \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell hh.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 hh.exe Key created \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 hh.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 7c003100000000005457578811005075626c69630000660009000400efbe874fdb497a5720382e000000f80500000000010000000000000000003c0000000000fef196005000750062006c0069006300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003600000016000000 hh.exe Key created \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 hh.exe Key created \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 hh.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 7800310000000000874fdc4911004d7573696300640009000400efbe874fdb495457a3882e000000fd0500000000010000000000000000003a00000000004410ee004d007500730069006300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380030003300000014000000 hh.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 54003100000000007a572b3810006b6134584f4800003e0009000400efbe7a572b387a572b382e000000632e0200000008000000000000000000000000000000ff4326006b006100340058004f004800000016000000 hh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Music" hh.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots hh.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff hh.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff hh.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4120 983d67d04388730ba628b27784a602d7e62f0e4089dee0332606bc9273063cfc.exe 4120 983d67d04388730ba628b27784a602d7e62f0e4089dee0332606bc9273063cfc.exe 4120 983d67d04388730ba628b27784a602d7e62f0e4089dee0332606bc9273063cfc.exe 4120 983d67d04388730ba628b27784a602d7e62f0e4089dee0332606bc9273063cfc.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4120 983d67d04388730ba628b27784a602d7e62f0e4089dee0332606bc9273063cfc.exe 4120 983d67d04388730ba628b27784a602d7e62f0e4089dee0332606bc9273063cfc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1828 hh.exe 1828 hh.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4120 wrote to memory of 2120 4120 983d67d04388730ba628b27784a602d7e62f0e4089dee0332606bc9273063cfc.exe 95 PID 4120 wrote to memory of 2120 4120 983d67d04388730ba628b27784a602d7e62f0e4089dee0332606bc9273063cfc.exe 95 PID 4120 wrote to memory of 2120 4120 983d67d04388730ba628b27784a602d7e62f0e4089dee0332606bc9273063cfc.exe 95 PID 4120 wrote to memory of 1828 4120 983d67d04388730ba628b27784a602d7e62f0e4089dee0332606bc9273063cfc.exe 96 PID 4120 wrote to memory of 1828 4120 983d67d04388730ba628b27784a602d7e62f0e4089dee0332606bc9273063cfc.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\983d67d04388730ba628b27784a602d7e62f0e4089dee0332606bc9273063cfc.exe"C:\Users\Admin\AppData\Local\Temp\983d67d04388730ba628b27784a602d7e62f0e4089dee0332606bc9273063cfc.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:2120
-
-
C:\Windows\hh.exeC:\Windows\hh.exe C:\Users\Public\Music\ka4XOH2⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.1MB
MD5b9cc4082b3d835bdf60f54d187cfc81e
SHA1c0354fc04bcd27dd79aa5019a99654b7600c8388
SHA2564b4fc187a3503f68fbeb540865b21d77e98bc8e83a155c8d5e725fe24eaa1910
SHA512932064375ed1dfab06193b413b9400cf0ad83b3e3feb307e0f7ea8c5d1003577dbd2cb30e51fc32860f995085062fc77365ad6976513788e71c28d10d11b6ce7
-
Filesize
797B
MD5af9ff765ed8cbfa8230453d158eb1d99
SHA112b0f420f360c01475e7e0dff387e2382f842991
SHA256d8b4c13435fe1fc4c484c0615a24f453b39c6f904e1ea038864b47e85507ec05
SHA51217dde7bc37c7f114349978e72ccb9297d52e712b609c6071838f6631469b4c342193fbc0b6481253a535481f8624537c299bf74f2ad6827732844ff990c10979
-
Filesize
105KB
MD56b8ebc942fe392c669b0b21bc8f83a03
SHA118fb9645a7365ae17b8386e47bec0b5ba6f5122f
SHA256e5a35deff01c93f658ab8c4192570ad9ae5ffaa4f5f6d1b4db99f176bf5bdbe7
SHA5120953d528c5d07b22fa0a969c98d569cf68e58450e1fc0179ddb2068cb4c429d23044a71005fd0daebe7e0c896c5a7598c5329e4c040be9099dfb1e62a2686589
-
Filesize
67B
MD5d278abedcbaa39d82de2392b3ba0dd1a
SHA11e0fbff21a806bccf12a9c7d1b73085db6a99ceb
SHA25699db4049e4039bb3dc5e3504828525a5ed0e7b5eb8a98b23c222728cfab7a549
SHA512744e16a865834c8d8f74a208b1fdc5e52840714562e7b90ef5f5cc31f804a84c64478f2b4e4b82fd41407845a02bfe6905c8a58cad521999038ef239b48fa15c
-
Filesize
14.3MB
MD5fa8e77c7e449aee331882f3f7d3db2a0
SHA14b7bff07d1e35f29dce8519a85f77304275f8b57
SHA2564f4712991061b558707171e1406a0f3e74c2643834b841fadbdb61e86335e63d
SHA512610d40af77197980b7ad016eda66ae6329564976e459139f724fed0b5e6e82c5d700748a9fa2ddaae4e6f0eac96c8efbc98545564b065d92cb008208843a2ec6